Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

No More Weak Links: Unleashing NDR and SASE for Hybrid Networks

The perimeter is gone. Hybrid work is here to stay. And MSPs sit at the crossroads of a network security evolution. This webinar focuses on how Network Detection and Response (NDR) and Secure Access Service Edge (SASE) are changing security delivery, showing MSPs how to lead this evolution. It will help you distinguish between hype and actionable strategies, empowering you to approach hybrid environments with a security-first mindset and evolve network security beyond traditional firewalls.

How GitHub Plans to Fix the Supply Chain - The 443 Podcast - Episode 345

This week on the podcast, we discuss Cisco's recent zero-day vulnerabilities before covering a Microsoft Threat Intelligence post on a phishing campaign that abuses SVG files. After that, we review GitHub's proposed changes for securing the open source software supply chain.

Agentic AI and the Future of Cybersecurity: A Field CTO's Perspective

When I talk to customers about AI these days, I usually get two very different reactions. Some lean forward, excited about the promise: fewer alerts, faster response, maybe even lights-out SOC operations someday. Others lean back, uneasy about the risks: does this mean attackers will be able to run thousands of hacks at once, automatically? The truth is, both reactions are justified. We are at the start of a shift toward agentic AI. This is not the same as today’s AI copilots that wait for prompts.

FireCloud Total Access: Secure Every User, Connection & Workplace Everywhere

With hybrid work, cloud applications, and distributed teams now the standard, organizations face a critical challenge: how to deliver secure, seamless access to both cloud-hosted and private applications without relying on outdated remote user VPNs or complex hardware.

Is your hybrid work as protected as you think?

The hybrid working model has blurred the traditional limit of corporate networks. With users accessing critical resources from remote locations, unmanaged networks and personal devices, attack surfaces have increased exponentially. This demands a cutting-edge, comprehensive and adaptive approach to security. A recent example in January 2025 makes this clear: a vulnerability in SimpleHelp - a remote access tool - let attackers compromise corporate endpoints and move laterally across the network.

When Firewalls Age Out: What the Akira Attack Can Teach Us About Lifecycle Security

Cyberattacks evolve faster than aging infrastructure can keep up, and expired hardware is one of the biggest blind spots organizations face today. The recent Akira ransomware campaign targeting SonicWall VPNs is a powerful reminder of what happens when devices slip out of support.

No More Ransom: Why the UK's Crackdown Signals the End of Paying Hackers

For years, ransomware gangs have thrived by holding businesses hostage, forcing a terrible choice: pay up or watch your systems collapse. That era is ending. After a summer of cyber chaos that hit everything from the NHS to Harrods, the UK government has drawn a red line: no more quiet payoffs, no more sweeping attacks under the rug.